Articles
Know Your Boundaries To Know your Strategy
Has your organization initiated a risk assessment and created a threat model that would have covered some of the following incidents over the last two years? The local branch of a shipping company updates the accounting application that is dominant in their region. With the updated application, they…
Don’t make this mistake with vendor contracts
This is a continuation of this blog on remote access. Has your organization signed up for remote management of critical infrastructure without your knowledge of the details? Many customers I work with were not aware of the contractual obligations they agreed to regarding remote access. Many customer…
Vendors as Attack Vectors – The Risk You Take with Partner Services
About the Author: Mr. Albach is the Sr. Product Line Manager of IoT Security and joined Cisco in 2010 when he defined and delivered three network security solutions with the most recent – Cisco’s first Industrial Security Appliance. Did you know you can be contractually obligated to let people…